New research from IBM X-Force reveals top tactics behind today's cyber attacks. While vulnerability statistics, attack trends, and data breaches are all covered in detail, one of the more interesting points of discussion is a look at the psychology...
Legacy anti-malware solutions tend to lack context, resulting in false-positive alerts that are ignored and real threats that are overlooked.
Emails advertising fake news about the crisis in Syria are spreading information-stealing malware to those who click on them.
Cyber criminals don't just use MitB malware to attack financial institutions. The latest target is Steam, an online gaming platform full of sensitive data.
Attackers are becoming more sophisticated and their malware more difficult to detect and block. New solutions are needed. Today, IBM is announcing the acquisition of Trusteer, a leader in combatting web fraud and the defense against advanced...
Intrusion prevention systems (IPS) have become one of the most critical layers in today's network security infrastructure. Although a mature technology, IPS technology must deal with an even broader and more sophisticated attack spectrum.
Need to convey how enterprise data is at risk from malware that infects the mobile devices of their users. The malware mines for user and enterprise data on the mobile device. If enterprise mobile applications are insecure not protected data is at...
Despite Carberp malware designed to bypass Trusteer Rapport defenses, the security system has held up against attacks made by cyber criminals.
Russian fraud forums abound with exchanges of malicious code. Recently, a forum member has been found selling the Carberp source code for $50,000.
I am planning to do a blog series on Malware Analysis using the Zeus sample that I recently received in an email. The idea is not only to share what it does, but to focus mostly on sufficient details.